The DDoS mitigation example was discussed before. It appeared there was a reasonable solution. Please see this post: http://www.ietf.org/mail-archive/web/sidr/current/msg05605.html
Sriram > >From: [email protected] [mailto:[email protected]] On Behalf Of >Danny McPherson >Sent: Wednesday, March 20, 2013 10:59 AM >To: Stephen Kent >Cc: [email protected] > >On Mar 20, 2013, at 9:44 AM, Stephen Kent <[email protected]> >>You cite DDoS mitigation as an example, whereas it seems to be more the >>example. > >Bah.. How many examples do you need? > >>Also, it's not clear >>that asserting a new origin AS for a target of such an attack is the only way >>to >>deal with the problem, just the way that it is performed today, for ASes that >>do >>not make arrangements in advance to counter such attacks. > >Hah, right. If you've any magic the industry would be interested in it Dr. >Kent. Until then, please try not to break current capabilities that real >operators >broadly use.. > >-danny _______________________________________________ sidr mailing list [email protected] https://www.ietf.org/mailman/listinfo/sidr
